Developing a Siamese Network for Intrusion Detection Systems

被引:12
|
作者
Hindy, Hanan [1 ]
Tachtatzis, Christos [2 ]
Atkinson, Robert [2 ]
Bayne, Ethan [1 ]
Bellekens, Xavier [2 ]
机构
[1] Abertay Univ, Div Cyber Secur, Dundee, Scotland
[2] Univ Strathclyde, EEE Dept, Glasgow, Lanark, Scotland
关键词
D O I
10.1145/3437984.3458842
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Machine Learning (ML) for developing Intrusion Detection Systems (IDS) is a fast-evolving research area that has many unsolved domain challenges. Current IDS models face two challenges that limit their performance and robustness. Firstly, they require large datasets to train and their performance is highly dependent on the dataset size. Secondly, zero-day attacks demand that machine learning models are retrained in order to identify future attacks of this type. However, the sophistication and increasing rate of cyber attacks make retraining time prohibitive for practical implementation. This paper proposes a new IDS model that can learn from pair similarities rather than class discriminative features. Learning similarities requires less data for training and provides the ability to flexibly adapt to new cyber attacks, thus reducing the burden of retraining. The underlying model is based on Siamese Networks, therefore, given a number of instances, numerous similar and dissimilar pairs can be generated. The model is evaluated using three mainstream IDS datasets; CICIDS2017, KDD Cup'99, and NSL-KDD. The evaluation results confirm the ability of the Siamese Network model to suit IDS purposes by classifying cyber attacks based on similaritybased learning. This opens a new research direction for building adaptable IDS models using non-conventional ML techniques.
引用
收藏
页码:120 / 126
页数:7
相关论文
共 50 条
  • [1] Siamese Network Based Feature Learning for Improved Intrusion Detection
    Jmila, Houda
    Ibn Khedher, Mohamed
    Blanc, Gregory
    El Yacoubi, Mounim A.
    NEURAL INFORMATION PROCESSING (ICONIP 2019), PT I, 2019, 11953 : 377 - 389
  • [2] Developing expertise for network intrusion detection
    Goodall, John R.
    Lutters, Wayne G.
    Komlodi, Anita
    INFORMATION TECHNOLOGY & PEOPLE, 2009, 22 (02) : 92 - 108
  • [3] Host-Based Intrusion Detection Model Using Siamese Network
    Park, Daekyeong
    Kim, Sangsoo
    Kwon, Hyukjin
    Shin, Dongil
    Shin, Dongkyoo
    IEEE ACCESS, 2021, 9 : 76614 - 76623
  • [4] Virtualization in Network Intrusion Detection Systems
    Akhlaq, Monis
    Alserhani, Faeiz
    Awan, Irfan U.
    Cullen, Andrea J.
    Mellor, John
    Mirchandani, Pravin
    ON THE MOVE TO MEANINGFUL INTERNET SYSTEMS: OTM 2009 WORKSHOPS, 2009, 5872 : 6 - +
  • [5] Performance of the Network Intrusion Detection Systems
    Murthy, M. V. Ramana
    Kumar, P. Ram
    Rao, E. Devender
    Sharma, A. C.
    Rajender, S.
    Rambabu, S.
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2009, 9 (10): : 198 - 202
  • [6] Oblivious network intrusion detection systems
    Sayed, Mahmoud AbdelHafeez
    Taha, Mostafa
    SCIENTIFIC REPORTS, 2023, 13 (01)
  • [7] Oblivious network intrusion detection systems
    Mahmoud AbdelHafeez Sayed
    Mostafa Taha
    Scientific Reports, 13
  • [8] Robust Network Intrusion Detection Systems for Outlier Detection
    Desai, Rohan
    Venkatesh, T. G.
    2022 IEEE 27TH INTERNATIONAL WORKSHOP ON COMPUTER AIDED MODELING AND DESIGN OF COMMUNICATION LINKS AND NETWORKS (CAMAD), 2022, : 140 - 146
  • [9] Adversarial examples for network intrusion detection systems
    Sheatsley, Ryan
    Papernot, Nicolas
    Weisman, Michael J.
    Verma, Gunjan
    McDaniel, Patrick
    JOURNAL OF COMPUTER SECURITY, 2022, 30 (05) : 727 - 752
  • [10] A benchmark evaluation of network intrusion detection systems
    Champion, T
    Denz, ML
    2001 IEEE AEROSPACE CONFERENCE PROCEEDINGS, VOLS 1-7, 2001, : 2705 - 2712